Cryptology ePrint Archive: Listing for 2013
-
2013/882 ( PDF )
- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
- Zhe Liu and Johann Großschädl
-
2013/881 ( PDF )
- Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
- Yonatan Sompolinsky and Aviv Zohar
-
2013/880 ( PDF )
- New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
- Seunghwan Park and Kwangsu Lee and Dong Hoon Lee
-
2013/879 ( PDF )
- Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
- Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
-
2013/878 ( PDF )
- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
- Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng
-
2013/877 ( PDF )
- MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
- Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
-
2013/876 ( PDF )
- Public-Key Encryption with Lazy Parties
- Kenji Yasunaga
-
2013/875 ( PDF )
- Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
- Michael Clear and Ciaran McGoldrick
-
2013/874 ( PDF )
- General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
- Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
-
2013/873 ( PDF )
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Mihir Bellare and Igors Stepanovs and Stefano Tessaro
-
2013/872 ( -- withdrawn -- )
-
-
-
2013/871 ( PDF )
- A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
- Weiqiang Wen and Libin Wang and Jiaxin Pan
-
2013/870 ( PDF )
- A new class of hyper-bent functions and Kloosterman sums
- Chunming Tang, Yanfeng Qi
-
2013/869 ( PDF )
- How to Fake Auxiliary Input
- Dimitar Jetchev and Krzysztof Pietrzak
-
2013/868 ( PDF )
- Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
- Lear Bahack
-
2013/867 ( PDF )
- LHash: A Lightweight Hash Function (Full Version)
- Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong
-
2013/866 ( PDF )
- Compact Ring-LWE based Cryptoprocessor
- Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede
-
2013/865 ( PDF )
- SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
- Suvadeep Hajra and Debdeep Mukhopadhyay
-
2013/864 ( PDF )
- Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs
- Adam Smith and Ye Zhang
-
2013/863 ( PDF )
- Formal Treatment of Distributed Trust in Electronic Voting
- Stephan Neumann and Melanie Volkamer
-
2013/862 ( PDF )
- How to Delegate Computations: The Power of No-Signaling Proofs
- Yael Tauman Kalai and Ran Raz and Ron D. Rothblum
-
2013/861 ( PDF )
- Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
- Muhammad Rizwan Asghar
-
2013/860 ( PDF )
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs
-
2013/859 ( PDF )
- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
- Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
-
2013/858 ( PDF )
- Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications
- Sherman S.M. Chow and Matthew Franklin and Haibin Zhang
-
2013/857 ( PDF )
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Daniel Genkin and Adi Shamir and Eran Tromer
-
2013/856 ( PDF )
- Tightly-Secure Signatures From Lossy Identification Schemes
- Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi
-
2013/855 ( PDF )
- Weaknesses in a Recently Proposed RFID Authentication Protocol
- Mete Akgün, M. Ufuk Çaǧlayan
-
2013/854 ( PDF )
- Multiple-Use Transferable E-Cash
- Pratik Sarkar
-
2013/853 ( PDF )
- Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
- Alex Biryukov and Vesselin Velichkov
-
2013/852 ( PDF )
- Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
- Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang
-
2013/851 ( PDF )
- Power and Timing Side Channels for PUFs and their Efficient Exploitation
- Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson
-
2013/850 ( PDF )
- Secure Floating-Point Arithmetic and Private Satellite Collision Analysis
- Liina Kamm and Jan Willemson
-
2013/849 ( PDF )
- Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
- Suvadeep Hajra and Debdeep Mukhopadhyay
-
2013/848 ( PDF )
- Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
- Xi-Jun Lin and Lin Sun
-
2013/847 ( -- withdrawn -- )
- Ultralightweight cryptography for passive RFID system
- Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed
-
2013/846 ( -- withdrawn -- )
- A new attack on RSA with a composed decryption exponent
- Abderrahmane Nitaj and Mohamed Ould Douh
-
2013/845 ( PDF )
- How to Keep a Secret: Leakage Deterring Public-key Cryptography
- Aggelos Kiayias and Qiang Tang
-
2013/844 ( PDF )
- A generic view on trace-and-revoke broadcast encryption schemes
- Dennis Hofheinz and Christoph Striecks
-
2013/843 ( PDF )
- A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues
- Jian Ye and Chenglian Liu
-
2013/842 ( PDF )
- Detecting Hidden Leakages
- Amir Moradi and Sylvain Guilley and Annelie Heuser
-
2013/841 ( PDF )
- Trust Views for the Web PKI
- Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser
-
2013/840 ( PDF )
- (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
- Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou
-
2013/839 ( PDF )
- Lattice Decoding Attacks on Binary LWE
- Shi Bai and Steven D. Galbraith
-
2013/838 ( PDF )
- An improved compression technique for signatures based on learning with errors
- Shi Bai and Steven D. Galbraith
-
2013/837 ( PDF )
- Fair Two-Party Computations via Bitcoin Deposits
- Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
-
2013/836 ( PDF )
- Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
- Hao Wang and Lei Wu and Zhihua Zheng and Yilei Wang
-
2013/835 ( PDF )
- A Modular Framework for Building Variable-Input Length Tweakable Ciphers
- Thomas Shrimpton and R. Seth Terashima
-
2013/834 ( PDF )
- Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
- Ahto Buldas and Andres Kroonmaa and Risto Laanoja
-
2013/833 ( PDF )
- Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
- Fabrice Benhamouda and David Pointcheval
-
2013/832 ( PDF )
- Practical Dynamic Searchable Encryption with Small Leakage
- Emil Stefanov and Charalampos Papamanthou and Elaine Shi
-
2013/831 ( PDF )
- Provable Security Proofs and their Interpretation in the Real World
- Vikram Singh
-
2013/830 ( PDF )
- Property Preserving Symmetric Encryption Revisited
- Sanjit Chatterjee and M. Prem Laxman Das
-
2013/829 ( PDF )
- Is Bitcoin a Decentralized Currency?
- Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun
-
2013/828 ( PDF )
- Decentralized Traceable Attribute-Based Signatures
- Ali El Kaafarani and Essam Ghadafi and Dalia Khader
-
2013/827 ( PDF )
- Lower Bounds in the Hardware Token Model
- Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen
-
2013/826 ( PDF )
- Secure multi-party data analysis: end user validation and practical experiments
- Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt
-
2013/825 ( -- withdrawn -- )
- EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
- Alberto Peinado and Jorge Munilla and Amparo Fúster
-
2013/824 ( PDF )
- Fair and Efficient Secure Multiparty Computation with Reputation Systems
- Gilad Asharov and Yehuda Lindell and Hila Zarosim
-
2013/823 ( PDF )
- Another Look at XCB
- Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar
-
2013/822 ( PDF )
- Leakage Resilient Fully Homomorphic Encryption
- Alexandra Berkoff and Feng-Hao Liu
-
2013/821 ( -- withdrawn -- )
- Exact Smooth Projective Hash Function based on LWE
- Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan
-
2013/820 ( -- withdrawn -- )
- On the Security of Recently Proposed RFID Protocols
- Mete Akgün, M. Ufuk Çaǧlayan
-
2013/819 ( PDF )
- Safe enclosures: towards cryptographic techniques for server protection
- Sergiu Bursuc and Julian P. Murphy
-
2013/818 ( PDF )
- On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
- Roberto De Prisco and Alfredo De Santis
-
2013/817 ( PDF )
- Interactive Encryption and Message Authentication
- Yevgeniy Dodis and Dario Fiore
-
2013/816 ( PDF )
- Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes
- Shay Gueron and Vlad Krasnov
-
2013/815 ( PDF )
- Iterated group products and leakage resilience against NC^1
- Eric Miles
-
2013/814 ( PDF )
- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
- Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
-
2013/813 ( PDF )
- Multi-ciphersuite security of the Secure Shell (SSH) protocol
- Florian Bergsma and Benjamin Dowling and Florian Kohlar and Jörg Schwenk and Douglas Stebila
-
2013/812 ( PDF )
- A Note on Bilinear Groups of a Large Composite Order
- Zhengjun Cao and Lihua Liu
-
2013/811 ( PDF )
- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
- Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto
-
2013/810 ( PDF )
- Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
- Pablo Rauzy and Sylvain Guilley
-
2013/809 ( PDF )
- Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
- Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk
-
2013/808 ( PDF )
- Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
- Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing
-
2013/807 ( PDF )
- Distributed Key Generation for Secure Encrypted Deduplication
- Yitao Duan
-
2013/806 ( PDF )
- Efficient (Anonymous) Compact HIBE From Standard Assumptions
- Somindu C. Ramanna and Palash Sarkar
-
2013/805 ( PDF )
- Proofs of Space: When Space is of the Essence
- Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi
-
2013/804 ( PDF )
- Group Signature with relaxed-privacy and revocability for VANET
- Mohammad Saiful Islam Mamun and Atsuko Miyaji
-
2013/803 ( PDF )
- Fully, (Almost) Tightly Secure IBE from Standard Assumptions
- Jie Chen and Hoeteck Wee
-
2013/802 ( PDF )
- Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
- Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
-
2013/801 ( PDF )
- Authenticating Computation on Groups: New Homomorphic Primitives and Applications
- Dario Catalano and Antonio Marcedone and Orazio Puglisi
-
2013/800 ( PDF )
- Algebraic Properties of the Cube Attack
- Frank-M. Quedenfeld and Christopher Wolf
-
2013/799 ( PDF )
- New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography
- Gilles Macario-Rat and Jérôme Plût and Henri Gilbert
-
2013/798 ( -- withdrawn -- )
- A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System
- Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu
-
2013/797 ( PDF )
- Tamper Resilient Circuits: The Adversary at the Gates
- Aggelos Kiayias and Yiannis Tselekounis
-
2013/796 ( PDF )
- Proofs of Space
- Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
-
2013/795 ( PDF )
- Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
- Xi-Jun Lin and Lin Sun
-
2013/794 ( PDF )
- Behind the Scene of Side Channel Attacks
- Victor Lomné, Emmanuel Prouff, and Thomas Roche
-
2013/793 ( PDF )
- A fast integer-based batch full-homomorphic encryption scheme over finite field
- Long Zhang and Qiuling Yue
-
2013/792 ( PDF )
- Improved Authenticity Bound of EAX, and Refinements
- Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata
-
2013/791 ( PDF )
- APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
- Elena Andreeva and Begül Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
-
2013/790 ( PDF )
- Parallelizable and Authenticated Online Ciphers
- Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda
-
2013/789 ( PDF )
- Proofs of Data Possession and Retrievability Based on MRD Codes
- Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu
-
2013/788 ( PDF )
- Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis
- Zhengjun Cao and Lihua Liu
-
2013/787 ( PDF )
- Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
- Raghuvir Songhela and Manik Lal Das
-
2013/786 ( PDF )
- Tree Based Symmetric Key Broadcast Encryption
- Sanjay Bhattacherjee and Palash Sarkar
-
2013/785 ( PDF )
- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
- Fei Tang, Hongda Li, Qihua Niu, and Bei Liang
-
2013/784 ( PDF )
- Secure Multiparty Computations on Bitcoin
- Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
-
2013/783 ( PDF )
- ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
- Yalin Chen and Jue-Sam Chou2
-
2013/782 ( PDF )
- How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
- Dorit Ron and Adi Shamir
-
2013/781 ( PDF )
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- Rafael Pass and Karn Seth and Sidharth Telang
-
2013/780 ( PDF )
- A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester
- Nasser Ramazani Darmian
-
2013/779 ( PDF )
- Distributed Group Authentication for RFID Supply Management
- Mike Burmester and Jorge Munilla
-
2013/778 ( PDF )
- Multi-Stage Fault Attacks on Block Ciphers
- Philipp Jovanovic and Martin Kreuzer and Ilia Polian
-
2013/777 ( PDF )
- Construction of Multiplicative Monotone Span Program
- Yuenai Chen and Chunming Tang
-
2013/776 ( PDF )
- Location Leakage in Distance Bounding: Why Location Privacy does not Work
- Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay
-
2013/775 ( PDF )
- Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
- Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu
-
2013/774 ( PDF )
- Multi-Input Functional Encryption
- S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2013/773 ( PDF )
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
- Markku-Juhani O. Saarinen
-
2013/772 ( PDF )
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Markku-Juhani O. Saarinen
-
2013/771 ( PDF )
- TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
- Wuqiang Shen and Shaohua Tang
-
2013/770 ( PDF )
- Efficient Template Attacks
- Omar Choudary and Markus G. Kuhn
-
2013/769 ( PDF )
- Broadcast Amplification
- Martin Hirt and Ueli Maurer and Pavel Raykov
-
2013/768 ( PDF )
- VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
- Bartosz Zoltak
-
2013/767 ( PDF )
- Misuse Resistant Parallel Authenticated Encryptions
- Nilanjan Datta and Mridul Nandi
-
2013/766 ( PDF )
- RankSign : an efficient signature algorithm based on the rank metric
- P. Gaborit and O. Ruatta and J. Schrek and G. Zémor
-
2013/765 ( PDF )
- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More
- Kaoru Kurosawa and Le Trieu Phong
-
2013/764 ( PDF )
- Dynamic Countermeasure Against the Zero Power Analysis
- Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
-
2013/763 ( PDF )
- Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
- Yutaka Kawai and Katsuyuki Takashima
-
2013/762 ( PDF )
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung
-
2013/761 ( PDF )
- Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
- Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati
-
2013/760 ( PDF )
- On cross joining de Bruijn sequences
- Johannes Mykkeltveit and Janusz Szmidt
-
2013/759 ( PDF )
- Vectorization of ChaCha Stream Cipher
- Martin Goll and Shay Gueron
-
2013/758 ( PDF )
- A Revocable Online-Offline Certificateless Signature Scheme without Pairing
- Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan
-
2013/757 ( PDF )
- Practical Signatures from the Partial Fourier Recovery Problem
- Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte
-
2013/756 ( PDF )
- A Meet-in-the-middle Attack on Round-Reduced mCrypton
- Yonglin Hao, Dongxia Bai
-
2013/755 ( -- withdrawn -- )
- Improving security and efficiency for multi-authority access control system in cloud storage
- Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong
-
2013/754 ( PDF )
- Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
- Omkant Pandey and Manoj Prabhakaran and Amit Sahai
-
2013/753 ( PDF )
- Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
- Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yalcin
-
2013/752 ( PDF )
- On the Power of Rewinding Simulators in Functional Encryption
- Angelo De Caro and Vincenzo Iovino
-
2013/751 ( PDF )
- Using Hamiltonian Totems as Passwords
- Hervé Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache
-
2013/750 ( PDF )
- Fully Deniable Mutual Authentication Protocol Based on RSA Signature
- Xi-Jun Lin and Lin Sun
-
2013/749 ( PDF )
- Efficient CCA-secure Threshold Public-Key Encryption Scheme
- Xi-Jun Lin and Lin Sun
-
2013/748 ( PDF )
- Plaintext Recovery Attacks Against WPA/TKIP
- Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt
-
2013/747 ( PDF )
- Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
- Jayaprakash Kar
-
2013/746 ( PDF )
- Asymptotically Efficient Lattice-Based Digital Signatures
- Vadim Lyubashevsky and Daniele Micciancio
-
2013/745 ( PDF )
- Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
- Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate
-
2013/744 ( PDF )
- Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
- Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
-
2013/743 ( -- withdrawn -- )
- Privacy Preserving Unique Statistics in a Smart Grid
- Iraklis Leontiadis, Melek Önen, Refik Molva
-
2013/742 ( PDF )
- CODING - Stream Cipher Methods by Varying Components during Ciphering Data
- Jürgen Müller
-
2013/741 ( PDF )
- Fast Software Implementation of Binary Elliptic Curve Cryptography
- Manuel Bluhm and Shay Gueron
-
2013/740 ( PDF )
- An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
- Gérald Gavin
-
2013/739 ( PDF )
- NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS
- Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi
-
2013/738 ( PDF )
- On the Resilience and Uniqueness of CPA for Secure Broadcast
- Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
-
2013/737 ( PDF )
- Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez
-
2013/736 ( PDF )
- TRS-80 With A Keccak Sponge Cake
- Jean-Marie Chauvet
-
2013/735 ( PDF )
- Masking Tables---An Underestimated Security Risk
- Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald
-
2013/734 ( PDF )
- Elliptic Curve Cryptography in Practice
- Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow
-
2013/733 ( -- withdrawn -- )
- A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol
- Maurizio Adriano Strangio
-
2013/732 ( PDF )
- SSS-V2: Secure Similarity Search
- Hyun-A Park
-
2013/731 ( PDF )
- Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited
- Yongqiang Li and Mingsheng Wang and Yuyin Yu
-
2013/730 ( PDF )
- Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees
- Łukasz Krzywiecki and Przemysław Kubiak and Mirosław Kutyłowski
-
2013/729 ( PDF )
- Functional Encryption for Randomized Functionalities
- Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai
-
2013/728 ( PDF )
- Modified Alternating Step Generators
- Robert Wicik and Tomasz Rachwalik
-
2013/727 ( PDF )
- Multi-Input Functional Encryption
- Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai
-
2013/726 ( PDF )
- Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
- Chihong Joo and Aaram Yun
-
2013/725 ( -- withdrawn -- )
- Mobile Transaction over NFC and GSM
- Muhammad Qasim Saeed and Pardis Pourghomi
-
2013/724 ( PDF )
- Verifiable Set Operations over Outsourced Databases
- Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos
-
2013/723 ( PDF )
- Amplifying Privacy in Privacy Amplification
- Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin
-
2013/722 ( PDF )
- The Realm of the Pairings
- Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini
-
2013/721 ( PDF )
- Deep Attacks of a Certificateless Signature Scheme
- Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li
-
2013/720 ( PDF )
- Outsourced Symmetric Private Information Retrieval
- Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
-
2013/719 ( PDF )
- Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
- Sandro Coretti and Ueli Maurer and Björn Tackmann
-
2013/718 ( PDF )
- NTRU-KE: A Lattice-based Public Key Exchange Protocol
- Xinyu Lei and Xiaofeng Liao
-
2013/717 ( PDF )
- NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2013/716 ( PDF )
- A Secure Obfuscator for Encrypted Blind Signature Functionality
- Xiao Feng and Zheng Yuan
-
2013/715 ( PDF )
- Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
- Erik-Oliver Blass and Travis Mayberry and Guevara Noubir
-
2013/714 ( PDF )
- Method to secure data in the cloud while preserving summary statistics
- Sanchita Barman, Bimal Roy
-
2013/713 ( PDF )
- Cryptanalysis of Zorro
- Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang
-
2013/712 ( PDF )
- PUF-Based RFID Authentication Secure and Private under Memory Leakage
- Daisuke Moriyama and Shin'ichiro Matsuo and Moti Yung
-
2013/711 ( PDF )
- Ambiguous One-Move Nominative Signature Without Random Oracles
- Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang
-
2013/710 ( PDF )
- An Approach to Reduce Storage for Homomorphic Computations
- Jung Hee Cheon and Jinsu Kim
-
2013/709 ( PDF )
- Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \& Concurrent Attacks
- Mohammad Sadeq Dousti and Rasool Jalili
-
2013/708 ( PDF )
- Key Derivation Without Entropy Waste
- Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs
-
2013/707 ( PDF )
- A reduction of semigroup DLP to classic DLP
- Matan Banin and Boaz Tsaban
-
2013/706 ( PDF )
- How to Certify the Leakage of a Chip?
- François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon
-
2013/705 ( PDF )
- Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation
- Clemens Heuberger and Michela Mazzoli
-
2013/704 ( PDF )
- Adaptive Witness Encryption and Asymmetric Password-based Cryptography
- Mihir Bellare and Viet Tung Hoang
-
2013/703 ( PDF )
- Limits of Extractability Assumptions with Distributional Auxiliary Input
- Elette Boyle and Rafael Pass
-
2013/702 ( PDF )
- Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
- Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs
-
2013/701 ( PDF )
- More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
- Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
-
2013/700 ( PDF )
- Higher Order Masking of Look-up Tables
- Jean-Sebastien Coron
-
2013/699 ( PDF )
- Bootstrapping Obfuscators via Fast Pseudorandom Functions
- Benny Applebaum
-
2013/698 ( PDF )
- Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
- Xi-Jun Lin and Lin Sun
-
2013/697 ( PDF )
- A More Efficient AES Threshold Implementation
- Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2013/696 ( PDF )
- Examination of a New Defense Mechanism: Honeywords
- Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
-
2013/695 ( PDF )
- AEGIS: A Fast Authenticated Encryption Algorithm
- Hongjun Wu and Bart Preneel
-
2013/694 ( PDF )
- Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data
- Lichun Li and Anwitaman Datta
-
2013/693 ( PDF )
- Secure Key Exchange and Sessions Without Credentials
- Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis
-
2013/692 ( PDF )
- Faster Compact Diffie-Hellman: Endomorphisms on the x-line
- Craig Costello and Huseyin Hisil and Benjamin Smith
-
2013/691 ( PDF )
- Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
-
2013/690 ( PDF )
- Obfuscation ==> (IND-CPA Security =/=> Circular Security)
- Antonio Marcedone and Claudio Orlandi
-
2013/689 ( PDF )
- Differing-Inputs Obfuscation and Applications
- Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry
-
2013/688 ( PDF )
- Unbalancing Pairing-Based Key Exchange Protocols
- Michael Scott
-
2013/687 ( PDF )
- How to Compress (Reusable) Garbled Circuits
- Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
-
2013/686 ( PDF )
- New abstractions in applied pi-calculus and automated verification of protected executions
- Shiwei Xu and Sergiu Bursuc and Julian P. Murphy
-
2013/685 ( PDF )
- Solving shortest and closest vector problems: The decomposition approach
- Anja Becker, Nicolas Gama and Antoine Joux
-
2013/684 ( PDF )
- Fully Bideniable Public-Key Encryption
- Marcel Šebek
-
2013/683 ( PDF )
- Separations in Circular Security for Arbitrary Length Key Cycles
- Venkata Koppula and Kim Ramchen and Brent Waters
-
2013/682 ( PDF )
- Secret Key Cryptosystem based on Non-Systematic Polar Codes
- Reza Hooshmand, Mohammad Reza Aref, and Taraneh Eghlidos
-
2013/681 ( PDF )
- Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
- Damien Vergnaud and David Xiao
-
2013/680 ( PDF )
- A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
- Dana Dachman-Soled
-
2013/679 ( PDF )
- Formal verification of a software countermeasure against instruction skip attacks
- Nicolas Moro and Karine Heydemann and Emmanuelle Encrenaz and Bruno Robisson
-
2013/678 ( PDF )
- Universally composable privacy preserving finite automata execution with low online and offline complexity
- Peeter Laud and Jan Willemson
-
2013/677 ( PDF )
- Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2013/676 ( PDF )
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
- Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
-
2013/675 ( PDF )
- A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
- Tomer Ashur and Orr Dunkelman
-
2013/674 ( PDF )
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2013/673 ( PDF )
- Traps to the BGJT-Algorithm for Discrete Logarithms
- Qi Cheng and Daqing Wan and Jincheng Zhuang
-
2013/672 ( PDF )
- Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
- Benjamin Smith
-
2013/671 ( PDF )
- Robust Pseudorandom Generators
- Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman
-
2013/670 ( PDF )
- Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
- Charanjit Jutla and Arnab Roy
-
2013/669 ( PDF )
- Attribute-Based Encryption for Arithmetic Circuits
- Dan Boneh and Valeria Nikolaenko and Gil Segev
-
2013/668 ( PDF )
- Obfuscation for Evasive Functions
- Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai
-
2013/667 ( PDF )
- A TPM Diffie-Hellman Oracle
- Tolga Acar and Lan Nguyen and Greg Zaverucha
-
2013/666 ( PDF )
- An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
- Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
-
2013/665 ( PDF )
- The Impossibility of Obfuscation with a Universal Simulator
- Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai
-
2013/664 ( PDF )
- TUC: Time-sensitive and Modular Analysis of Anonymous Communication
- Michael Backes and Praveen Manoharan and Esfandiar Mohammadi
-
2013/663 ( PDF )
- Linear Cryptanalysis of Round Reduced SIMON
- Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya
-
2013/662 ( PDF )
- Fine-Tuning Groth-Sahai Proofs
- Alex Escala and Jens Groth
-
2013/661 ( PDF )
- Private aggregation on untrusted servers with customizable thresholds
- Constantinos Patsakis, Michael Clear, Paul Laird
-
2013/660 ( PDF )
- Discrete Logarithms and Mordell-Weil Groups
- Mohammad Sadek
-
2013/659 ( PDF )
- A provable secure anonymous proxy signature scheme without random oracles
- Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
-
2013/658 ( PDF )
- Parallel authenticated encryption with the duplex construction
- Pawel Morawiecki and Josef Pieprzyk
-
2013/657 ( PDF )
- New Trapdoor Projection Maps for Composite-Order Bilinear Groups
- Sarah Meiklejohn and Hovav Shacham
-
2013/656 ( PDF )
- Bias-based modeling and entropy analysis of PUFs
- Robbert van den Berg and Boris Skoric and Vincent van der Leest
-
2013/655 ( PDF )
- Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
- Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel
-
2013/654 ( PDF )
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Baodong Qin and Shengli Liu
-
2013/653 ( PDF )
- RKA-KDM secure encryption from public-key encryption
- Florian Böhl and Gareth T. Davies and Dennis Hofheinz
-
2013/652 ( PDF )
- Efficient Modular Arithmetic for SIMD Devices
- Wilke Trei
-
2013/651 ( PDF )
- A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound
- Sanjit Chatterjee and Chethan Kamath
-
2013/650 ( PDF )
- On Extractability (a.k.a. Differing-Inputs) Obfuscation
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2013/649 ( PDF )
- Security Analysis of Password-Authenticated Key Retrieval
- SeongHan Shin and Kazukuni Kobara
-
2013/648 ( PDF )
- Integral Distinguishers for Reduced-round Stribog
- Riham AlTawy and Amr M. Youssef
-
2013/647 ( PDF )
- A note on high-security general-purpose elliptic curves
- Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira and Jefferson E. Ricardini
-
2013/646 ( PDF )
- Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
- Johannes Blömer and Gennadij Liske
-
2013/645 ( PDF )
- FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
- Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin Küpçü and Öznur Özkasap
-
2013/644 ( PDF )
- Elliptic and Hyperelliptic Curves: a Practical Security Analysis
- Joppe W. Bos and Craig Costello and Andrea Miele
-
2013/643 ( PDF )
- There is no Indistinguishability Obfuscation in Pessiland
- Tal Moran and Alon Rosen
-
2013/642 ( PDF )
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Dan Boneh and Mark Zhandry
-
2013/641 ( PDF )
- Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
- Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
-
2013/640 ( PDF )
- Communication-Efficient MPC for General Adversary Structures
- Joshua Lampkins and Rafail Ostrovsky
-
2013/639 ( PDF )
- Differentially 4-Uniform Bijections by Permuting the Inverse Function
- Deng Tang and Claude Carlet and Xiaohu Tang
-
2013/638 ( PDF )
- DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
- Somindu C. Ramanna
-
2013/637 ( PDF )
- Detection of Algebraic Manipulation in the Presence of Leakage
- Hadi Ahmadi and Reihaneh Safavi-Naini
-
2013/636 ( PDF )
- SCARE of Secret Ciphers with SPN Structures
- Matthieu Rivain and Thomas Roche
-
2013/635 ( PDF )
- Universal security; from bits and mips to pools, lakes -- and beyond
- Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
-
2013/634 ( PDF )
- Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2013/633 ( PDF )
- Four Measures of Nonlinearity
- J. Boyar and M.G. Find and R. Peralta
-
2013/632 ( PDF )
- Combined Modeling and Side Channel Attacks on Strong PUFs
- Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar
-
2013/631 ( PDF )
- Protecting Obfuscation Against Algebraic Attacks
- Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai
-
2013/630 ( PDF )
- Estimating Key Sizes For High Dimensional Lattice-Based Systems
- Joop van de Pol and Nigel P. Smart
-
2013/629 ( PDF )
- Secure Key Management in the Cloud
- Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter
-
2013/628 ( PDF )
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Kazuhiko Minematsu
-
2013/627 ( PDF )
- Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
- Jiawei Yuan and Shucheng Yu
-
2013/626 ( PDF )
- Improved Linear Attacks on the Chinese Block Cipher Standard
- Mingjie Liu and Jiazhe Chen
-
2013/625 ( PDF )
- PillarBox: Combating next-generation malware with fast forward-secure logging
- Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos
-
2013/624 ( -- withdrawn -- )
- New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption
- Xiaolin Cao and Ciara Moore
-
2013/623 ( PDF )
- Off-Path Hacking: The Illusion of Challenge-Response Authentication
- Yossi Gilad and Amir Herzberg and Haya Shulman
-
2013/622 ( PDF )
- Decentralized Anonymous Credentials
- Christina Garman and Matthew Green and Ian Miers
-
2013/621 ( PDF )
- Multi-LHL protocol
- Marika Mitrengová
-
2013/620 ( PDF )
- Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
- Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
-
2013/619 ( PDF )
- Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
- Jeroen Delvaux and Ingrid Verbauwhede
-
2013/618 ( PDF )
- Security Amplification against Meet-in-the-Middle Attacks Using Whitening
- Pierre-Alain Fouque and Pierre Karpman
-
2013/617 ( PDF )
- Some results concerning global avalanche characteristics of two $q$-ary functions
- Brajesh Kumar Singh
-
2013/616 ( PDF )
- Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
- Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan and Neil Hanley
-
2013/615 ( PDF )
- Privacy and Verifiability in Voting Systems: Methods, Developments and Trends
- Hugo Jonker and Sjouke Mauw and Jun Pang
-
2013/614 ( PDF )
- Is extracting data the same as possessing data?
- Douglas R. Stinson and Jalaj Upadhyay
-
2013/613 ( PDF )
- Recomputing with Permuted Operands: A Concurrent Error Detection Approach
- Xiaofei Guo and Ramesh Karri
-
2013/612 ( PDF )
- Sub-linear Blind Ring Signatures without Random Oracles
- Essam Ghadafi
-
2013/611 ( PDF )
- Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
- Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki
-
2013/610 ( PDF )
- Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
- Jeroen Delvaux and Ingrid Verbauwhede
-
2013/609 ( PDF )
- Ultra Low-Power implementation of ECC on the ARM Cortex-M0+
- Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede
-
2013/608 ( PDF )
- Towards Optimal Leakage Exploitation Rate in Template Attacks
- Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
-
2013/607 ( PDF )
- Cryptanalysis of Full RIPEMD-128
- Franck Landelle and Thomas Peyrin
-
2013/606 ( PDF )
- Revocable quantum timed-release encryption
- Dominique Unruh
-
2013/605 ( PDF )
- Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
- Masao KASAHARA
-
2013/604 ( PDF )
- Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
- Jörg Schwenk
-
2013/603 ( PDF )
- Invariance-Based Concurrent Error Detection for Advanced Encryption Standard
- Xiaofei Guo and Ramesh Karri
-
2013/602 ( PDF )
- On the Efficacy of Solving LWE by Reduction to Unique-SVP
- Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert
-
2013/601 ( PDF )
- Two-round secure MPC from Indistinguishability Obfuscation
- Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova
-
2013/600 ( PDF )
- Improved Cryptanalysis of Reduced RIPEMD-160
- Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu
-
2013/599 ( PDF )
- Factoring RSA keys from certified smart cards: Coppersmith in the wild
- Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren
-
2013/598 ( PDF )
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
- Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar
-
2013/597 ( PDF )
- Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
- Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa
-
2013/596 ( PDF )
- Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study
- Michael Shantz and Edlyn Teske
-
2013/595 ( PDF )
- Enhanced certificate transparency and end-to-end encrypted mail
- Mark D. Ryan
-
2013/594 ( PDF )
- A Local-Global Approach to Solving Ideal Lattice Problems
- Yuan Tian and Rongxin Sun and Xueyong Zhu
-
2013/593 ( PDF )
- Efficient One-Sided Adaptively Secure Computation
- Carmit Hazay and Arpita Patra
-
2013/592 ( PDF )
- Cryptanalysis of the Toorani-Falahati Hill Ciphers
- Liam Keliher and Anthony Z. Delaney
-
2013/591 ( PDF )
- Analysis of the Rainbow Tradeoff Algorithm Used in Practice
- Jung Woo Kim and Jin Hong and Kunsoo Park
-
2013/590 ( PDF )
- EyeDecrypt -- Private Interactions in Plain Sight
- Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis
-
2013/589 ( PDF )
- Smashing MASH-1
- Vladimir Antipkin
-
2013/588 ( PDF )
- SPHF-Friendly Non-Interactive Commitments
- Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval
-
2013/587 ( PDF )
- ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments
- Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
-
2013/586 ( PDF )
- Generic related-key and induced chosen IV attacks using the method of key differentiation
- Enes Pasalic and Yongzhuang Wei
-
2013/585 ( PDF )
- On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two
- Xiutao Feng and Guang Gong
-
2013/584 ( PDF )
- Cryptanalysis of GOST R Hash Function
- Zongyue Wang, Hongbo Yu, Xiaoyun Wang
-
2013/583 ( PDF )
- polynomial selection for the number field sieve in geometric view
- Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
-
2013/582 ( PDF )
- The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions
- Antoine Joux and Cécile Pierrot
-
2013/581 ( PDF )
- PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones
- Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
-
2013/580 ( PDF )
- Random Projections, Graph Sparsification, and Differential Privacy
- Jalaj Upadhyay
-
2013/579 ( PDF )
- On Measurable Side-Channel Leaks inside ASIC Design Primitives
- Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino
-
2013/578 ( PDF )
- A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
- Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov
-
2013/577 ( PDF )
- Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
- Luís T. A. N. Brandão
-
2013/576 ( PDF )
- Extended Criterion for Absence of Fixed Points
- Oleksandr Kazymyrov and Valentyna Kazymyrova
-
2013/575 ( PDF )
- Equivalence between MAC and PRF for Blockcipher based Constructions
- Nilanjan Datta and Mridul Nandi
-
2013/574 ( PDF )
- On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
- Mridul Nandi
-
2013/573 ( PDF )
- Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
- Leibo Li and Keting Jia and Xiaoyun Wang
-
2013/572 ( PDF )
- Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
- Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay
-
2013/571 ( PDF )
- Efficient General-Adversary Multi-Party Computation
- Martin Hirt and Daniel Tschudi
-
2013/570 ( PDF )
- New Efficient Identity-Based Encryption From Factorization
- Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao
-
2013/569 ( PDF )
- More Efficient Cryptosystems From $k^{th}$-Power Residues
- Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
-
2013/568 ( PDF )
- Cryptanalysis of the Speck Family of Block Ciphers
- Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
-
2013/567 ( PDF )
- KDM Security in the Hybrid Framework
- Gareth T. Davies and Martijn Stam
-
2013/566 ( PDF )
- Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
- Jeroen Delvaux and Ingrid Verbauwhede
-
2013/565 ( PDF )
- Non-Malleable Coding Against Bit-wise and Split-State Tampering
- Mahdi Cheraghchi and Venkatesan Guruswami
-
2013/564 ( PDF )
- Capacity of Non-Malleable Codes
- Mahdi Cheraghchi and Venkatesan Guruswami
-
2013/563 ( PDF )
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Zvika Brakerski and Guy N. Rothblum
-
2013/562 ( PDF )
- Self-pairings on supersingular elliptic curves with embedding degree $three$
- Binglong Chen and Chang-An~Zhao
-
2013/561 ( PDF )
- Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
- Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
-
2013/560 ( PDF )
- Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time
- Ben Morris and Phillip Rogaway
-
2013/559 ( PDF )
- A Definitional Framework for Functional Encryption
- Christian Matt and Ueli Maurer
-
2013/558 ( PDF )
- Practical approaches to varying network size in combinatorial key predistribution schemes
- Kevin Henry and Maura B. Paterson and Douglas R. Stinson
-
2013/557 ( PDF )
- Black-Box Obfuscation for d-CNFs
- Zvika Brakerski and Guy N. Rothblum
-
2013/556 ( PDF )
- Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
- Oleksandr Kazymyrov and Valentyna Kazymyrova
-
2013/555 ( PDF )
- Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
- Ueli Maurer and Björn Tackmann and Sandro Coretti
-
2013/554 ( PDF )
- Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
- Pablo Rauzy and Sylvain Guilley and Zakaria Najm
-
2013/553 ( PDF )
- Multi-Valued Byzantine Broadcast: the $t < n$ Case
- Martin Hirt and Pavel Raykov
-
2013/552 ( PDF )
- More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
- Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
-
2013/551 ( PDF )
- Puzzle Encryption Algorithm
- Gregory Alvarez and Charles Berenguer
-
2013/550 ( -- withdrawn -- )
- More Efficient Cryptosystems From k-th Power Residues
- Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
-
2013/549 ( PDF )
- Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
- Koh-ichi Nagao
-
2013/548 ( PDF )
- Decomposition formula of the Jacobian group of plane curve
- Koh-ichi Nagao
-
2013/547 ( PDF )
- Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
- Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang
-
2013/546 ( PDF )
- TRS-80 with a grain of salt
- Jean-Marie Chauvet
-
2013/545 ( PDF )
- Private Over-threshold Aggregation Protocols over Distributed Databases
- Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
-
2013/544 ( PDF )
- Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
- Christian Hanser and Daniel Slamanig
-
2013/543 ( PDF )
- Cryptanalysis of the SIMON Family of Block Ciphers
- Hoda A. Alkhzaimi and Martin M. Lauridsen
-
2013/542 ( PDF )
- Searching for Nonlinear Feedback Shift Registers with Parallel Computing
- Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt
-
2013/541 ( PDF )
- Lattice-Based FHE as Secure as PKE
- Zvika Brakerski and Vinod Vaikuntanathan
-
2013/540 ( PDF )
- On the security of a password-only authenticated three-party key exchange protocol
- Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
-
2013/539 ( PDF )
- Rebound attacks on Stribog
- Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef
-
2013/538 ( PDF )
- Practical Issues with TLS Client Certificate Authentication
- Arnis Parsovs
-
2013/537 ( PDF )
- Inter-FSP Funds Transfer Protocol
- Amir Herzberg and Shay Nachmani
-
2013/536 ( PDF )
- A Three-Level Sieve Algorithm for the Shortest Vector Problem
- Feng Zhang and Yanbin Pan and Gengran Hu
-
2013/535 ( PDF )
- Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
- Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede
-
2013/534 ( PDF )
- Efficient Unobservable Anonymous Reporting against Strong Adversaries
- Nethanel Gelernter and Amir Herzberg
-
2013/533 ( PDF )
- Gossip Latin Square and The Meet-All Gossipers Problem
- Nethanel Gelernter and Amir Herzberg
-
2013/532 ( PDF )
- On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
- Takakazu Satoh
-
2013/531 ( PDF )
- On the Limits of Provable Anonymity
- Nethanel Gelernter and Amir Herzberg
-
2013/530 ( PDF )
- The Parallel-Cut Meet-In-The-Middle Attack
- Ivica Nikolic and Lei Wang and Shuang Wu
-
2013/529 ( PDF )
- How to Withstand Mobile Virus Attacks, Revisited
- Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
-
2013/528 ( PDF )
- Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
- Somindu C. Ramanna and Palash Sarkar
-
2013/527 ( PDF )
- The Spammed Code Offset Method
- Boris Skoric and Niels de Vreede
-
2013/526 ( PDF )
- Differential and Linear Cryptanalysis of Reduced-Round Simon
- Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
-
2013/525 ( PDF )
- Catena : A Memory-Consuming Password-Scrambling Framework
- Christian Forler and Stefan Lucks and Jakob Wenzel
-
2013/524 ( PDF )
- Threshold Secret Image Sharing
- Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren
-
2013/523 ( PDF )
- White-Box Security Notions for Symmetric Encryption Schemes
- Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain
-
2013/522 ( PDF )
- The Resistance of PRESENT-80 Against Related-Key Differential Attacks
- Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang
-
2013/521 ( PDF )
- Multiple Limited-Birthday Distinguishers and Applications
- Jérémy Jean and María Naya-Plasencia and Thomas Peyrin
-
2013/520 ( PDF )
- Locally Updatable and Locally Decodable Codes
- Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky
-
2013/519 ( PDF )
- Montgomery Multiplication Using Vector Instructions
- Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha
-
2013/518 ( -- withdrawn -- )
- Universal Leaky Random Oracle Model
- Guangjun Fan and Yongbin Zhou and Dengguo Feng
-
2013/517 ( PDF )
- Improvement of One Adaptive Oblivious Transfer Scheme
- Zhengjun Cao and Lihua Liu
-
2013/516 ( PDF )
- Algebraic MACs and Keyed-Verification Anonymous Credentials
- Melissa Chase and Sarah Meiklejohn and Gregory M. Zaverucha
-
2013/515 ( PDF )
- When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
- Changyu Dong and Liqun Chen and Zikai Wen
-
2013/514 ( PDF )
- Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
- Jia Xu and Jianying Zhou
-
2013/513 ( PDF )
- Enforcing Language Semantics Using Proof-Carrying Data
- Stephen Chong and Eran Tromer and Jeffrey A. Vaughan
-
2013/512 ( PDF )
- Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
- Jingguo Bi and Phong Q. Nguyen
-
2013/511 ( PDF )
- Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
- Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref
-
2013/510 ( PDF )
- Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
- Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick Weiden
-
2013/509 ( PDF )
- Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
- Susan Hohenberger and Amit Sahai and Brent Waters
-
2013/508 ( PDF )
- Multi-Key Searchable Encryption
- Raluca Ada Popa and Nickolai Zeldovich
-
2013/507 ( PDF )
- SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
- Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza
-
2013/506 ( PDF )
- A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
- Pablo Rauzy and Sylvain Guilley
-
2013/505 ( PDF )
- Improvement of One Anonymous Identity-Based Encryption
- Zhengjun Cao and Lihua Liu
-
2013/504 ( PDF )
- A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves
- Reza Azarderakhsh and Koray Karabina
-
2013/503 ( PDF )
- On secret sharing with nonlinear product reconstruction
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
-
2013/502 ( PDF )
- Proving TLS-attack related open biases of RC4
- Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra
-
2013/501 ( PDF )
- Type-Based Analysis of Protected Storage in the TPM (full version)
- Jianxiong Shao and Dengguo Feng and Yu Qin
-
2013/500 ( PDF )
- Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
- Ran Canetti and Vinod Vaikuntanathan
-
2013/499 ( PDF )
- Limits on the Power of Cryptographic Cheap Talk
- Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen
-
2013/498 ( PDF )
- Non-Malleable Codes from Two-Source Extractors
- Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
-
2013/497 ( PDF )
- Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
- Zhengjun Cao and Hanyue Cao
-
2013/496 ( PDF )
- Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
- Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas
-
2013/495 ( PDF )
- Revocable IBE Systems with Almost Constant-size Key Update
- Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang
-
2013/494 ( PDF )
- Differential Fault Attack against Grain family with very few faults and minimal assumptions
- Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra
-
2013/493 ( PDF )
- A new class of semi-bent quadratic Boolean functions
- Chunming Tang and Yanfeng Qi
-
2013/492 ( PDF )
- Cryptographically Enforced RBAC
- Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi
-
2013/491 ( PDF )
- Improved OT Extension for Transferring Short Secrets
- Vladimir Kolesnikov and Ranjit Kumaresan
-
2013/490 ( PDF )
- For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
- Masoumeh Safkhani, Nasour Bagheri
-
2013/489 ( PDF )
- An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
- Constantinos Patsakis and Agusti Solanas
-
2013/488 ( PDF )
- Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
- Kwangsu Lee and Dong Hoon Lee
-
2013/487 ( PDF )
- Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2013/486 ( -- withdrawn -- )
- Handling Authentication and Detection Probability in Multi-tag RFID Environment
- Subhasish Dhal and Indranil Sengupta
-
2013/485 ( -- withdrawn -- )
- A New Object Searching Protocol for Multi-tag RFID
- Subhasish Dhal and Indranil Sengupta
-
2013/484 ( -- withdrawn -- )
- Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
- Jiawei Yuan and Shucheng Yu
-
2013/483 ( PDF )
- A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
- Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun
-
2013/482 ( PDF )
- Bounds in Shallows and in Miseries
- Céline Blondeau and Andrey Bogdanov and Gregor Leander
-
2013/481 ( PDF )
- Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
- Yosuke Todo and Keita Xagawa
-
2013/480 ( PDF )
- Efficient Multiparty Protocols via Log-Depth Threshold Formulae
- Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum
-
2013/479 ( PDF )
- Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
- B. Skoric
-
2013/478 ( PDF )
- Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
- Stefan G. Weber
-
2013/477 ( PDF )
- Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
- Renaud Dubois and Margaux Dugardin and Aurore Guillevic
-
2013/476 ( PDF )
- Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
- Sourav Sen Gupta and Subhamoy Maitra and Willi Meier and Goutam Paul and Santanu Sarkar
-
2013/475 ( PDF )
- A note on verifying the APN property
- Pascale Charpin and Gohar M. Kyureghyan
-
2013/474 ( PDF )
- Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
- Zhengjun Cao
-
2013/473 ( PDF )
- The Norwegian Internet Voting Protocol
- Kristian Gjøsteen
-
2013/472 ( PDF )
- Partially blind password-based signatures using elliptic curves
- Kristian Gjøsteen
-
2013/471 ( PDF )
- Obfuscating Conjunctions
- Zvika Brakerski and Guy N. Rothblum
-
2013/470 ( PDF )
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
- Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
-
2013/469 ( PDF )
- Verifiable Delegation of Computation on Outsourced Data
- Michael Backes and Dario Fiore and Raphael M. Reischuk
-
2013/468 ( PDF )
- How To Construct Extractable One-Way Functions Against Uniform Adversaries
- Nir Bitansky and Ran Canetti and Omer Paneth
-
2013/467 ( PDF )
- Analysis of BLAKE2
- Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu
-
2013/466 ( PDF )
- Efficient computation of addition-subtraction chains using generalized continued Fractions
- Amadou Tall and Ali Yassin Sanghare
-
2013/465 ( PDF )
- Practical & Provably Secure Distance-Bounding
- Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay
-
2013/464 ( PDF )
- Towards A Practical JCJ / Civitas Implementation
- Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig
-
2013/463 ( PDF )
- Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
- Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
-
2013/462 ( PDF )
- VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
- Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese
-
2013/461 ( PDF )
- HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
- Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu
-
2013/460 ( PDF )
- Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
- Rafik Chaabouni
-
2013/459 ( PDF )
- Reset Indifferentiability and its Consequences
- Paul Baecher and Christina Brzuska and Arno Mittelbach
-
2013/458 ( PDF )
- Exponentiating in Pairing Groups
- Joppe W. Bos and Craig Costello and Michael Naehrig
-
2013/457 ( PDF )
- Deduction Soundness: Prove One, Get Five for Free
- Florian Böhl and Véronique Cortier and Bogdan Warinschi
-
2013/456 ( PDF )
- On the Security of Group-based Proxy Re-encryption Scheme
- Purushothama B R and B B Amberker
-
2013/455 ( PDF )
- Another Nail in the Coffin of White-Box AES Implementations
- Tancrède Lepoint and Matthieu Rivain
-
2013/454 ( PDF )
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
- Amit Sahai and Brent Waters
-
2013/453 ( PDF )
- Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
- Nasour Bagheri, Masoumeh Safkhani
-
2013/452 ( PDF )
- Secure Channel Coding Schemes based on Polar Codes
- Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
-
2013/451 ( PDF )
- Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
- Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters
-
2013/450 ( PDF )
- Revisiting the BGE Attack on a White-Box AES Implementation
- Yoni De Mulder and Peter Roelse and Bart Preneel
-
2013/449 ( PDF )
- A Note On the Storage Requirement for AKS Primality Testing Algorithm
- Zhengjun Cao
-
2013/448 ( PDF )
- Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
- Yuval Yarom and Katrina Falkner
-
2013/447 ( PDF )
- Dynamic Runtime Methods to Enhance Private Key Blinding
- Karine Gandolfi-Villegas and Nabil Hamzi
-
2013/446 ( PDF )
- Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
-
2013/445 ( PDF )
- Implementing Lightweight Block Ciphers on x86 Architectures
- Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin
-
2013/444 ( PDF )
- Sequential message authentication code without random oracles
- Bin Wang and Xiaojing Hong
-
2013/443 ( PDF )
- Optimally Anonymous and Transferable Conditional E-cash
- Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu
-
2013/442 ( PDF )
- On Fair Exchange, Fair Coins and Fair Sampling
- Shashank Agrawal and Manoj Prabhakaran
-
2013/441 ( -- withdrawn -- )
- On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
- Yongge Wang
-
2013/440 ( PDF )
- Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
- Mitsugu Iwamoto and Junji Shikata
-
2013/439 ( PDF )
- Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
- Peter Pessl and Michael Hutter
-
2013/438 ( PDF )
- Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
- Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl
-
2013/437 ( PDF )
- A Uniform Min-Max Theorem with Applications in Cryptography
- Salil Vadhan and Colin Jia Zheng
-
2013/436 ( PDF )
- Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version
- Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang
-
2013/435 ( PDF )
- Efficient Cryptosystems From $2^k$-th Power Residue Symbols
- Marc Joye and Benoit Libert
-
2013/434 ( PDF )
- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
- Susan Hohenberger and Amit Sahai and Brent Waters
-
2013/433 ( PDF )
- On Symmetric Encryption with Distinguishable Decryption Failures
- Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
-
2013/432 ( PDF )
- How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
- Eric Brier and David Naccache and Li-yao Xia
-
2013/431 ( PDF )
- Practical-Time Attacks Against Reduced Variants of MISTY1
- Orr Dunkelman and Nathan Keller
-
2013/430 ( PDF )
- Security of the Misty Structure Beyond the Birthday Bound
- Jooyoung Lee
-
2013/429 ( PDF )
- DupLESS: Server-Aided Encryption for Deduplicated Storage
- Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
-
2013/428 ( PDF )
- Faster 128-EEA3 and 128-EIA3 Software
- Roberto Avanzi and Billy Bob Brumley
-
2013/427 ( PDF )
- Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials
- Jiangtao Han and Haining Fan
-
2013/426 ( PDF )
- Efficient Garbling from a Fixed-Key Blockcipher
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway
-
2013/425 ( PDF )
- Break WEP Faster with Statistical Analysis
- Rafik Chaabouni
-
2013/424 ( PDF )
- Instantiating Random Oracles via UCEs
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
-
2013/423 ( PDF )
- Locally Computable UOWHF with Linear Shrinkage
- Benny Applebaum and Yoni Moses
-
2013/422 ( PDF )
- Private Database Queries Using Somewhat Homomorphic Encryption
- Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu
-
2013/421 ( PDF )
- Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
- Valentina Banciu and Simon Hoerder and Dan Page
-
2013/420 ( PDF )
- The Holey Grail: A special score function for non-binary traitor tracing
- B. Skoric and J.-J. Oosterwijk and J. Doumen
-
2013/419 ( PDF )
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
- Rikke Bendlin and Sara Krehbiel and Chris Peikert
-
2013/418 ( PDF )
- On Tight Security Proofs for Schnorr Signatures
- Nils Fleischhacker and Tibor Jager and Dominique Schröder
-
2013/417 ( PDF )
- The Improved Cube Attack on Grain-v1
- Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang
-
2013/416 ( PDF )
- Computational Fuzzy Extractors
- Benjamin Fuller and Xianrui Meng and Leonid Reyzin
-
2013/415 ( PDF )
- Short collision search in arbitrary SL2 homomorphic hash functions
- Ciaran Mullan and Boaz Tsaban
-
2013/414 ( PDF )
- A novel certificateless deniable authentication protocol
- Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
-
2013/413 ( PDF )
- Policy-Based Signatures
- Mihir Bellare and Georg Fuchsbauer
-
2013/412 ( PDF )
- Moduar Form Aprroach to Solving Lattice Problems
- Yuan Tian, Xueyong Zhu, Rongxin Sun
-
2013/411 ( PDF )
- Security Analysis of Lightweight Authentication Protocol from WISTP 2013
- Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
-
2013/410 ( PDF )
- Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
- Yossi Gilad and Amir Herzberg
-
2013/409 ( PDF )
- Order-Preserving Encryption Secure Beyond One-Wayness
- Tal Malkin and Isamu Teranishi and Moti Yung
-
2013/408 ( PDF )
- Delegatable Functional Signatures
- Michael Backes and Sebastian Meiser and Dominique Schröder
-
2013/407 ( PDF )
- Automated Security Proofs for Almost-Universal Hash for MAC verification
- Martin Gagné and Pascal Lafourcade and Yassine Lakhnech
-
2013/406 ( -- withdrawn -- )
- Attribute-Based Server-Aided Verification Signature
- Zhiwei Wang and Ruirui Xie and Wei Zhang and Liwen He and Guozi Sun and Wei Chen
-
2013/405 ( PDF )
- New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields
- Chunming Tang, Yanfeng Qi, Maozhi Xu
-
2013/404 ( PDF )
- The SIMON and SPECK Families of Lightweight Block Ciphers
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2013/403 ( PDF )
- Function-Private Subspace-Membership Encryption and Its Applications
- Dan Boneh and Ananth Raghunathan and Gil Segev
-
2013/402 ( PDF )
- Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
- Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4
-
2013/401 ( PDF )
- Functional Signatures and Pseudorandom Functions
- Elette Boyle and Shafi Goldwasser and Ioana Ivan
-
2013/400 ( PDF )
- A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
- Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé
-
2013/399 ( PDF )
- Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
- Roel Peeters and Jens Hermans
-
2013/398 ( PDF )
- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
- Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
-
2013/397 ( PDF )
- Practical Secure Logging: Seekable Sequential Key Generators
- Giorgia Azzurra Marson and Bertram Poettering
-
2013/396 ( PDF )
- On the Practical Security of a Leakage Resilient Masking Scheme
- Emmanuel Prouff and Matthieu Rivain and Thomas Roche
-
2013/394 ( PDF )
- A Public Key Cryptoscheme Using Bit-pair Shadows
- Shenghui Su and Shuwang Lv and Maozhi Xu
-
2013/393 ( PDF )
- Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
- Yong Li and Zheng Yang
-
2013/392 ( PDF )
- Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
- Christian Hanser and Daniel Slamanig
-
2013/391 ( PDF )
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2013/390 ( PDF )
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
- Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada
-
2013/389 ( PDF )
- A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
- Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
-
2013/388 ( PDF )
- Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions
- Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi
-
2013/387 ( PDF )
- Cryptographically Protected Prefixes for Location Privacy in IPv6
- Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain
-
2013/386 ( PDF )
- Side Channel Attacks against Pairing over Theta Functions
- Nadia El Mrabet
-
2013/385 ( -- withdrawn -- )
- Cryptanalysis of ultralightweight RFID authentication protocol
- Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed, Usman Mujahid
-
2013/384 ( PDF )
- Sequential Aggregate Signatures Made Shorter
- Kwangsu Lee and Dong Hoon Lee and Moti Yung
-
2013/383 ( PDF )
- Lattice Signatures and Bimodal Gaussians
- Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky
-
2013/382 ( PDF )
- To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
- Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro
-
2013/381 ( -- withdrawn -- )
- Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl
- Bingke Ma and Bao Li and Ronglin Hao
-
2013/380 ( PDF )
- Comments on Three Multi-Server Authentication Protocols
- Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3
-
2013/379 ( PDF )
- Delegatable Pseudorandom Functions and Applications
- Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias
-
2013/378 ( PDF )
- A note on quantum related-key attacks
- Martin Roetteler and Rainer Steinwandt
-
2013/377 ( PDF )
- An Algebraic Framework for Diffie-Hellman Assumptions
- Alex Escala and Gottfried Herold and Eike Kiltz and Carla Ràfols and Jorge Villar
-
2013/376 ( PDF )
- An Accurate Probabilistic Reliability Model for Silicon PUFs
- Roel Maes
-
2013/375 ( PDF )
- NaCl on 8-Bit AVR Microcontrollers
- Michael Hutter and Peter Schwabe
-
2013/374 ( PDF )
- A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
- Majid Bayat, Mohammad Reza Aref
-
2013/373 ( PDF )
- Injective Encoding to Elliptic Curves
- Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi
-
2013/372 ( PDF )
- Practical Bootstrapping in Quasilinear Time
- Jacob Alperin-Sheriff and Chris Peikert
-
2013/371 ( PDF )
- Domain-Polymorphic Programming of Privacy-Preserving Applications
- Dan Bogdanov and Peeter Laud and Jaak Randmets
-
2013/370 ( PDF )
- Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
- François-Xavier Standaert and Olivier Pereira and Yu Yu
-
2013/369 ( PDF )
- Block Ciphers that are Easier to Mask: How Far Can we Go?
- Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert
-
2013/368 ( PDF )
- Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--
- Jacques Patarin
-
2013/367 ( PDF )
- On the Security of TLS-DH and TLS-RSA in the Standard Model
- Florian Kohlar and Sven Schäge and Jörg Schwenk
-
2013/366 ( PDF )
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
- Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
-
2013/365 ( PDF )
- Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
- Zheng Yang
-
2013/364 ( PDF )
- On the Achievability of Simulation-Based Security for Functional Encryption
- Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano
-
2013/363 ( PDF )
- A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
- Masao KASAHARA
-
2013/362 ( PDF )
- A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor
- Shigeo MITSUNARI
-
2013/361 ( PDF )
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
-
2013/360 ( PDF )
- Achieving the limits of the noisy-storage model using entanglement sampling
- Frédéric Dupuis and Omar Fawzi and Stephanie Wehner
-
2013/359 ( PDF )
- A heuristic for finding compatible differential paths with application to HAS-160
- Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef
-
2013/358 ( PDF )
- Counter-cryptanalysis
- Marc Stevens
-
2013/357 ( PDF )
- The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
- Dmitry Khovratovich and Christian Rechberger
-
2013/356 ( PDF )
- Verifying Computations with State (Extended Version)
- Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish
-
2013/355 ( PDF )
- New Attacks against Transformation-Based Privacy-Preserving Linear Programming
- Peeter Laud and Alisa Pankova
-
2013/354 ( PDF )
- Programmable Hash Functions in the Multilinear Setting
- Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks
-
2013/353 ( PDF )
- Profiling DPA: Efficacy and efficiency trade-offs
- Carolyn Whitnall and Elisabeth Oswald
-
2013/352 ( PDF )
- Constrained Pseudorandom Functions and Their Applications
- Dan Boneh and Brent Waters
-
2013/351 ( PDF )
- Time-Optimal Interactive Proofs for Circuit Evaluation
- Justin Thaler
-
2013/350 ( PDF )
- Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
- Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam
-
2013/349 ( PDF )
- A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
- Martin Hirt and Christoph Lucas and Ueli Maurer
-
2013/348 ( PDF )
- Multi-file proofs of retrievability for cloud storage auditing
- Bin Wang and Xiaojing Hong
-
2013/347 ( PDF )
- STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
-
2013/346 ( PDF )
- Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
- Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson
-
2013/345 ( PDF )
- Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
- Arnab Roy and Srinivas Vivek
-
2013/344 ( PDF )
- Limits of provable security for homomorphic encryption
- Andrej Bogdanov and Chin Ho Lee
-
2013/343 ( PDF )
- Quantum one-time programs
- Anne Broadbent and Gus Gutoski and Douglas Stebila
-
2013/342 ( PDF )
- Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices
- Xiang Xie and Rui Xue
-
2013/341 ( PDF )
- Trapdoor Smooth Projective Hash Functions
- Fabrice Benhamouda and David Pointcheval
-
2013/340 ( PDF )
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Craig Gentry and Amit Sahai and Brent Waters
-
2013/339 ( PDF )
- On the Security of the TLS Protocol: A Systematic Analysis
- Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee
-
2013/338 ( PDF )
- Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
- Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
-
2013/337 ( PDF )
- Attribute-Based Encryption for Circuits
- Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2013/336 ( -- withdrawn -- )
- A Novel Technique in Linear Cryptanalysis
- Wen-Long Sun Jie Guan Lin Ding
-
2013/335 ( PDF )
- Parallel and Dynamic Searchable Symmetric Encryption
- Seny Kamara and Charalampos Papamanthou
-
2013/334 ( PDF )
- Protecting PUF Error Correction by Codeword Masking
- Dominik Merli and Frederic Stumpf and Georg Sigl
-
2013/333 ( PDF )
- Double-authentication-preventing signatures
- Bertram Poettering and Douglas Stebila
-
2013/332 ( PDF )
- A method for obtaining lower bounds on the higher order nonlinearity of Boolean function
- Mikhail S. Lobanov
-
2013/331 ( PDF )
- New Constructions and Applications of Trapdoor DDH Groups
- Yannick Seurin
-
2013/330 ( PDF )
- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
- Afonso Arriaga and Qiang Tang and Peter Ryan
-
2013/329 ( PDF )
- Protocol Variants and Electronic Identification
- Kristian Gjøsteen
-
2013/328 ( PDF )
- Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
- Nicky Mouha and Bart Preneel
-
2013/327 ( PDF )
- A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
- Shenghui Su and Tao Xie and Shuwang Lv
-
2013/326 ( PDF )
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Mihir Bellare and Sarah Meiklejohn and Susan Thomson
-
2013/325 ( PDF )
- Elligator: Elliptic-curve points indistinguishable from uniform random strings
- Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange
-
2013/324 ( PDF )
- Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
- Anne Canteaut and María Naya-Plasencia and Bastien Vayssiere
-
2013/323 ( PS PS.GZ PDF )
- Encryption Schemes with Post-Challenge Auxiliary Inputs
- Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu
-
2013/322 ( PDF )
- BLAKE2: simpler, smaller, fast as MD5
- Jean-Philippe Aumasson and Samuel Neves and Zooko Wilcox-O'Hearn and Christian Winnerlein
-
2013/321 ( PDF )
- Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
- Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
-
2013/320 ( PDF )
- Instantaneous Frequency Analysis
- Roman Korkikian and David Naccache and Guilherme Ozari de Almeida
-
2013/319 ( PDF )
- On the use of continued fractions for stream ciphers
- Amadou Moctar Kane
-
2013/318 ( PDF )
- Fully-Anonymous Functional Proxy-Re-Encryption
- Yutaka Kawai and Katsuyuki Takashima
-
2013/317 ( PDF )
- Anon-Pass: Practical Anonymous Subscriptions
- Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel
-
2013/316 ( PDF )
- Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
- José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir
-
2013/315 ( PDF )
- Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
- Albrecht Petzoldt
-
2013/314 ( PDF )
- Keyed Side-Channel Based Hashing for IP Protection using Wavelets
- Timo Bartkewitz
-
2013/313 ( PDF )
- Pairing Inversion via Non-degenerate Auxiliary Pairings
- Seunghwan Chang and Hoon Hong and Eunjeong Lee and Hyang-Sook Lee
-
2013/312 ( PDF )
- Families of fast elliptic curves from Q-curves
- Benjamin Smith
-
2013/311 ( PDF )
- Four-dimensional GLV via the Weil restriction
- Aurore Guillevic and Sorina Ionica
-
2013/310 ( PDF )
- MinimaLT: Minimal-latency Networking Through Better Security
- W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange
-
2013/309 ( PDF )
- Bypassing Passkey Authentication in Bluetooth Low Energy
- Tomas Rosa
-
2013/308 ( PDF )
- Lattice-Based Group Signatures with Logarithmic Signature Size
- Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
-
2013/307 ( PDF )
- Maliciously Circuit-Private FHE
- Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
-
2013/306 ( PDF )
- Solving a $6120$-bit DLP on a Desktop Computer
- Faruk Göloğlu and Robert Granger and Gary McGuire and Jens Zumbrägel
-
2013/305 ( PDF )
- Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
- Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich
-
2013/304 ( PDF )
- Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers
- Anthony Van Herrewege and Vincent van der Leest and André Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede
-
2013/303 ( PDF )
- Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
- Shivam Bhasin and Claude Carlet and Sylvain Guilley
-
2013/302 ( PDF )
- Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
- Nicolas T. Courtois
-
2013/301 ( PDF )
- Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
- Zheng Yuan and Xian Li and Haixia Liu
-
2013/300 ( PDF )
- A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
- Allison Lewko and Sarah Meiklejohn
-
2013/299 ( PDF )
- Computing class polynomials for abelian surfaces
- Andres Enge and Emmanuel Thomé
-
2013/298 ( PDF )
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin Wojcik
-
2013/297 ( PDF )
- Improvement and Efficient Implementation of a Lattice-based Signature Scheme
- Rachid El~Bansarkhani and Johannes Buchmann
-
2013/296 ( PDF )
- Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
- Morten Dahl and Ivan Damgård
-
2013/295 ( PDF )
- Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
- Mickaël Cazorla and Kevin Marquet and Marine Minier
-
2013/294 ( PDF )
- Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
- Colin O'Flynn and Zhizhang (David) Chen
-
2013/293 ( PDF )
- A Toolkit for Ring-LWE Cryptography
- Vadim Lyubashevsky and Chris Peikert and Oded Regev
-
2013/292 ( PDF )
- A Leakage Resilient MAC
- Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik
-
2013/291 ( PDF )
- Security ranking among assumptions within the Uber assumption framework
- Antoine Joux and Antoine Rojat
-
2013/290 ( PDF )
- Massive Group Message Authentication with Revocable Anonymity
- Boaz Catane and Amir Herzberg
-
2013/289 ( PDF )
- Secure Second Price Auctions with a Rational Auctioneer
- Boaz Catane and Amir Herzberg
-
2013/288 ( PDF )
- Key Classification Attack on Block Ciphers
- Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi
-
2013/287 ( PDF )
- The failure of McEliece PKC based on Reed-Muller codes.
- I. V. Chizhov and M. A. Borodin
-
2013/286 ( PDF )
- Salvaging Indifferentiability in a Multi-stage Setting
- Arno Mittelbach
-
2013/285 ( PDF )
- A Novel Proof on Weil Pairing
- Sutirtha Sanyal
-
2013/284 ( PDF )
- A Secure Paper-Based Electronic Voting With No Encryption
- Asghar Tavakkoli, Reza Ebrahimi Atani
-
2013/283 ( PDF )
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Dan Boneh and Ananth Raghunathan and Gil Segev
-
2013/282 ( PDF )
- Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
- Goutam Paul and Anupam Chattopadhyay
-
2013/281 ( PDF )
- Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
- Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit
-
2013/280 ( PDF )
- Path ORAM: An Extremely Simple Oblivious RAM Protocol
- Emil Stefanov and Marten van Dijk and Elaine Shi and T-H. Hubert Chan and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas
-
2013/279 ( PDF )
- Pinocchio: Nearly Practical Verifiable Computation
- Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova
-
2013/278 ( PDF )
- A Frequency Leakage Model and its application to CPA and DPA
- S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine
-
2013/277 ( PDF )
- ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
- Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
-
2013/276 ( PDF )
- Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
- David Bernhard and Stephan Neumann and Melanie Volkamer
-
2013/275 ( PDF )
- The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
- Johannes Braun and Gregor Rynkowski
-
2013/274 ( PDF )
- A time series approach for profiling attack
- Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
-
2013/273 ( PDF )
- Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions
- Deepak Kumar Dalai
-
2013/272 ( PDF )
- Cryptography Challenges for Computational Privacy in Public Clouds
- Sashank Dara
-
2013/271 ( PDF )
- The Legal Classification of Identity-Based Signatures
- Christoph Sorge
-
2013/270 ( PDF )
- Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
- Yu Yu
-
2013/269 ( PDF )
- CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
- Jonathan Trostle
-
2013/268 ( PDF )
- Dynamic Cube Attack on Grain-v1
- Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
-
2013/267 ( PDF )
- Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
- S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee
-
2013/266 ( PDF )
- L-P States of RC4 Stream Cipher
- Jing Lv and Dongdai Lin
-
2013/265 ( PDF )
- Attribute-Based Encryption with Fast Decryption
- Susan Hohenberger and Brent Waters
-
2013/264 ( PDF )
- Encrypted Secret Sharing and Analysis by Plaintext Randomization
- Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
-
2013/263 ( PDF )
- Speeding up QUAD
- Albrecht Petzoldt
-
2013/262 ( PDF )
- An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
- Gérald Gavin
-
2013/261 ( PDF )
- Secure information transmission based on physical principles
- Dima Grigoriev and Vladimir Shpilrain
-
2013/260 ( PDF )
- From Weak to Strong Zero-Knowledge and Applications
- Kai-Min Chung and Edward Lui and Rafael Pass
-
2013/259 ( PDF )
- Private Interactive Communication Across an Adversarial Channel
- Ran Gelles and Amit Sahai and Akshay Wadia
-
2013/258 ( PDF )
- Witness Encryption and its Applications
- Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
-
2013/257 ( PDF )
- Secure two-party computation: a visual way
- Paolo D'Arco and Roberto De Prisco
-
2013/256 ( PDF )
- On the Lossiness of the Rabin Trapdoor Function
- Yannick Seurin
-
2013/255 ( PDF )
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Rodolphe Lampe and Yannick Seurin
-
2013/254 ( PDF )
- Towards Adoption of DNSSEC: Availability and Security Challenges
- Amir Herzberg and Haya Shulman
-
2013/253 ( PDF )
- CacheAudit: A Tool for the Static Analysis of Cache Side Channels
- Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke
-
2013/252 ( PDF )
- On the Primitivity of some Trinomials over Finite Fields
- LI Yujuan, WANG Huaifu, ZHAO Jinhua
-
2013/251 ( PDF )
- Permutation Polynomials and Their Differential Properties over Residue Class Rings
- Yuyin Yu and Mingsheng Wang
-
2013/250 ( PDF )
- Fully Homomorphic Encryption for Mathematicians
- Alice Silverberg
-
2013/249 ( PDF )
- How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
- Kaoru Kurosawa and Takuma Ueda
-
2013/248 ( PDF )
- Another Look at Security Theorems for 1-Key Nested MACs
- Neal Koblitz and Alfred Menezes
-
2013/247 ( PDF )
- Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
- Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu
-
2013/246 ( PDF )
- A Lever Function to a New Codomain with Adequate Indeterminacy
- Shenghui Su and Maozhi Xu and Shuwang Lv
-
2013/245 ( PDF )
- The Fiat-Shamir Transformation in a Quantum World
- Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni
-
2013/244 ( PDF )
- Cryptographic schemes, key exchange, public key.
- Ted Hurley
-
2013/243 ( PDF )
- A Simple ORAM
- Kai-Min Chung and Rafael Pass
-
2013/242 ( PDF )
- AE5 Security Notions: Definitions Implicit in the CAESAR Call
- Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
-
2013/241 ( PDF )
- The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
- Joachim Strömbergson and Simon Josefsson
-
2013/240 ( PDF )
- Algebraic analysis of Trivium-like ciphers
- Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
-
2013/239 ( PDF )
- Optimizing ORAM and Using it Efficiently for Secure Computation
- Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs
-
2013/238 ( PDF )
- Anonymity-preserving Public-Key Encryption: A Constructive Approach
- Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi
-
2013/237 ( PDF )
- Type-Based Analysis of Generic Key Management APIs (Long Version)
- Pedro Adão and Riccardo Focardi and Flaminia L. Luccio
-
2013/236 ( PDF )
- A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
- Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo
-
2013/235 ( PDF )
- Ballot secrecy and ballot independence: definitions and relations
- Ben Smyth and David Bernhard
-
2013/234 ( PDF )
- A Cryptographic Analysis of OPACITY
- Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete
-
2013/233 ( PDF )
- Attacks on JH, Grøstl and SMASH Hash Functions
- Yiyuan Luo and Xuejia Lai
-
2013/232 ( PDF )
- Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function
- Kaushik Chakraborty and Anupam Chattopadhyay and Subhamoy Maitra
-
2013/231 ( PDF )
- Sakura: a flexible coding for tree hashing
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2013/230 ( PDF )
- Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
- Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo
-
2013/229 ( PDF )
- How to Run Turing Machines on Encrypted Data
- Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and and Nickolai Zeldovich
-
2013/228 ( PDF )
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
-
2013/227 ( PDF )
- Analysis of authentication and key establishment in inter-generational mobile telephony
- Chunyu Tang and David A. Naumann and Susanne Wetzel
-
2013/226 ( PDF )
- Public key exchange using semidirect product of (semi)groups
- Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
-
2013/225 ( PDF )
- Transparent, Distributed, and Replicated Dynamic Provable Data Possession
- Mohammad Etemad and Alptekin Küpçü
-
2013/224 ( PDF )
- On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
- Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater
-
2013/223 ( PDF )
- The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
- Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
-
2013/222 ( PDF )
- Tight security bounds for key-alternating ciphers
- Shan Chen, John Steinberger
-
2013/221 ( PDF )
- Identity-based Aggregate Signatures with Verifiable Single Ones
- Yang Zhang, Jun-liang Chen
-
2013/220 ( PDF )
- Towards Efficient Private Distributed Computation on Unbounded Input Streams
- Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky
-
2013/219 ( PDF )
- Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
- Stefan G. Weber
-
2013/218 ( PDF )
- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
- Aurore Guillevic
-
2013/217 ( PDF )
- Computing on Authenticated Data for Adjustable Predicates
- Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein
-
2013/216 ( PDF )
- Election Verifiability or Ballot Privacy: Do We Need to Choose?
- Edouard Cuvelier and Olivier Pereira and Thomas Peters
-
2013/215 ( PDF )
- Optical PUFs Reloaded
- Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek
-
2013/214 ( PDF )
- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
- Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora
-
2013/213 ( PDF )
- On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
- Guangjun Fan and Yongbin Zhou and F.-X. Standaert and Dengguo Feng
-
2013/212 ( PDF )
- A Closer Look at HMAC
- Krzysztof Pietrzak
-
2013/211 ( PDF )
- A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
- Christina Boura and Anne Canteaut
-
2013/210 ( PDF )
- Cryptophia's Short Combiner for Collision-Resistant Hash Functions
- Arno Mittelbach
-
2013/209 ( PDF )
- New modular multiplication and division algorithms based on continued fraction expansion
- Mourad Gouicem
-
2013/208 ( PDF )
- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
- Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou
-
2013/207 ( PDF )
- Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
- Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng
-
2013/206 ( PDF )
- Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
- Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko
-
2013/205 ( PDF )
- Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
- Jan Camenisch and Robert R. Enderlein and Victor Shoup
-
2013/204 ( PDF )
- Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
- Shi Pu, Jyh-Charn Liu
-
2013/203 ( PDF )
- From oblivious AES to efficient and secure database join in the multiparty setting
- Sven Laur and Riivo Talviste and Jan Willemson
-
2013/202 ( PDF )
- Breaking NLM-MAC Generator
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
-
2013/201 ( PDF )
- Non-malleable Codes from Additive Combinatorics
- Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett
-
2013/200 ( PDF )
- Selecting polynomials for the Function Field Sieve
- Razvan Barbulescu
-
2013/199 ( PDF )
- Quantum algorithms for the subset-sum problem
- Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer
-
2013/198 ( PDF )
- On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
- Zhizhou Li and Ten H. Lai
-
2013/197 ( PDF )
- Discrete logarithm in GF(2^809) with FFS
- Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann
-
2013/196 ( PDF )
- Fast Two-Party Secure Computation with Minimal Assumptions
- abhi shelat and Chih-hao Shen
-
2013/195 ( PDF )
- On the (re)design of an FPGA-based PUF
- Philipp Grabher and Dan Page and Marcin Wójcik
-
2013/194 ( PDF )
- On the Impossibility of Cryptography with Tamperable Randomness
- Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth
-
2013/193 ( PDF )
- Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
- Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng
-
2013/192 ( PDF )
- A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
- David Lubicz and Damien Robert
-
2013/191 ( PDF )
- Improved Differential Fault Analysis on ARIA using Small Number of Faults
- Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
-
2013/190 ( PDF )
- Power Analysis Attacks against FPGA Implementations of KLEIN
- Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong
-
2013/189 ( PDF )
- Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
- Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah
-
2013/188 ( PDF )
- A family of 6-to-4-bit S-boxes with large linear branch number
- Daniel Loebenberger and Michael Nüsken
-
2013/187 ( PDF )
- Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
- Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo
-
2013/186 ( PDF )
- On the (Im)possibility of Projecting Property in Prime-Order Setting
- Jae Hong Seo
-
2013/185 ( PDF )
- Security Analysis of Linearly Filtered NLFSRs
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett
-
2013/184 ( PDF )
- The Vernam cipher is robust to small deviations from randomness
- Boris Ryabko
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2013/182 ( PDF )
- Collusion-Resistant Domain-Specific Pseudonymous Signatures
- Julien Bringer and Herve Chabanne and Alain Patey
-
2013/181 ( PDF )
- On the evaluation of modular polynomials
- Andrew V. Sutherland
-
2013/180 ( PDF )
- A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
- Masao KASAHARA
-
2013/179 ( PDF )
- Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2013/178 ( PDF )
- Cryptanalysis of RC4(n,m) Stream Cipher
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
-
2013/177 ( PDF )
- A generic construction for voting correctness at minimum cost - Application to Helios
- Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene
-
2013/176 ( PDF )
- Distinguishing Attacks on RC4 and A New Improvement of the Cipher
- Jing Lv and Bin Zhang and Dongdai Lin
-
2013/175 ( PDF )
- Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
- Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano
-
2013/174 ( PDF )
- Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
- Deukjo Hong and Daesung Kwon
-
2013/173 ( PDF )
- On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
- Ray Perlner and Daniel Smith-Tone
-
2013/172 ( PDF )
- On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
- Raphael Spreitzer and Thomas Plos
-
2013/171 ( PDF )
- Confined Guessing: New Signatures From Standard Assumptions
- Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks
-
2013/170 ( PDF )
- Fast Collision Attack on MD5
- Tao Xie and Fanbao Liu and Dengguo Feng
-
2013/169 ( PDF )
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
-
2013/168 ( PDF )
- On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
- Simon Hoerder and Kimmo Järvinen and Dan Page
-
2013/167 ( PDF )
- Single Password Authentication
- Tolga Acar and Mira Belenkiy and Alptekin Küpçü
-
2013/166 ( PDF )
- On generalized semi-bent (and partially bent) Boolean functions
- Brajesh Kumar Singh
-
2013/165 ( -- withdrawn -- )
- A New Security and Privacy Framework for RFID In Cloud Computing
- Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
-
2013/164 ( PDF )
- Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
- Daniel Cabarcas and Florian Göpfert and Patrick Weiden
-
2013/163 ( PDF )
- Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
- Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan
-
2013/162 ( PDF )
- A Non Asymptotic Analysis of Information Set Decoding
- Yann Hamdaoui and Nicolas Sendrier
-
2013/161 ( PDF )
- Completeness Theorems for All Finite Stateless 2-Party Primitives
- Daniel Kraschewski
-
2013/160 ( PDF )
- Interactive Coding, Revisited
- Kai-Min Chung and Rafael Pass and Sidharth Telang
-
2013/159 ( PDF )
- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
- Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei
-
2013/158 ( PDF )
- Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version)
- Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez
-
2013/157 ( PDF )
- The fragility of AES-GCM authentication algorithm
- Shay Gueron and Vlad Krasnov
-
2013/156 ( PDF )
- Incentivizing Outsourced Computation
- Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya
-
2013/155 ( PDF )
- MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
- Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
-
2013/154 ( PDF )
- Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
- Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
-
2013/153 ( PDF )
- On the security of a certicateless signature scheme in the standard model
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
-
2013/152 ( PDF )
- Policy-based Secure Deletion
- Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti
-
2013/151 ( PDF )
- Some Fixes To SSH
- Xu ZiJie
-
2013/150 ( PDF )
- Practical (Second) Preimage Attacks on TCS_SHA-3
- Gautham Sekar and Soumyadeep Bhattacharya
-
2013/149 ( PDF )
- Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
- Jiawei Yuan and Shucheng Yu
-
2013/148 ( PDF )
- AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
- Alexander Rostovtsev
-
2013/147 ( PDF )
- A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
- Naomi Benger and Manuel Charlemagne and Kefei Chen
-
2013/146 ( PDF )
- High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
- Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
-
2013/145 ( PDF )
- Key Wrapping with a Fixed Permutation
- Dmitry Khovratovich
-
2013/144 ( PDF )
- On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
- Gordon Procter and Carlos Cid
-
2013/143 ( PDF )
- An architecture for practical actively secure MPC with dishonest majority
- Marcel Keller and Peter Scholl and Nigel P. Smart
-
2013/142 ( PDF )
- A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
- Kisoon YOON
-
2013/141 ( PDF )
- Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
- M. Shakiba and M. Dakhilalian and H. Mala
-
2013/140 ( PDF )
- Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
- Marc Fischlin and Nils Fleischhacker
-
2013/139 ( PDF )
- Rethinking Definitions of Security for Session Key Agreement
- Wesley George and Charles Rackoff
-
2013/138 ( PDF )
- Multi-bit homomorphic encryption based on learning with errors over rings
- Zhang Wei, Liu Shuguang, Yang Xiaoyuan
-
2013/137 ( PDF )
- How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
- Payman Mohassel and Saeed Sadeghian
-
2013/136 ( PDF )
- 2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
- Dieter Schmidt
-
2013/135 ( PDF )
- An MQ/Code Cryptosystem Proposal
- Leonard J. Schulman
-
2013/134 ( PDF )
- Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
- Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III
-
2013/133 ( PDF )
- New Lattice Based Signature Using The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2013/132 ( PDF )
- Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
- Niu Liu and Shaohua Tang and Lingling Xu
-
2013/131 ( PDF )
- Two is the fastest prime: lambda coordinates for binary elliptic curves
- Thomaz Oliveira and Julio López and Diego F. Aranha and Francisco Rodríguez-Henríquez
-
2013/130 ( PDF )
- Blank Digital Signatures
- Christian Hanser and Daniel Slamanig
-
2013/129 ( PDF )
- An Ideal-Security Protocol for Order-Preserving Encoding
- Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich
-
2013/128 ( PDF )
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters
-
2013/127 ( PDF )
- Oblivious PAKE: Efficient Handling of Password Trials
- Franziskus Kiefer and Mark Manulis
-
2013/126 ( PDF )
- Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
- Aysajan Abidin and Jan-Åke Larsson
-
2013/125 ( PDF )
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- Ananth Raghunathan and Gil Segev and Salil Vadhan
-
2013/124 ( -- withdrawn -- )
- Tamper Resilient Cryptography Without Self-Destruct
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi,
-
2013/123 ( PDF )
- Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
- Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2013/122 ( PDF )
- Practical collision attack on 40-step RIPEMD-128
- Gaoli Wang
-
2013/121 ( PDF )
- Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
- Helger Lipmaa
-
2013/120 ( PDF )
- An Attack Against Fixed Value Discrete Logarithm Representations
- Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks
-
2013/119 ( PDF )
- Speeding up Ate Pairing Computation in Affine Coordinates
- Duc-Phong Le and Chik How Tan
-
2013/118 ( PDF )
- Throughput Optimized Implementations of QUAD
- Jason R. Hamlet and Robert W. Brocato
-
2013/117 ( PDF )
- On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
- Namhun Koo and Gook Hwa Cho and Soonhak Kwon
-
2013/116 ( PDF )
- The Algorithm of AAES
- Shiyong Zhang and Gongliang Chen and Lei Fan
-
2013/115 ( PDF )
- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
- Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang
-
2013/114 ( PDF )
- Public Key Exchange Using Matrices Over Group Rings
- Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
-
2013/113 ( PDF )
- Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
- Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
-
2013/112 ( PDF )
- PUF Modeling Attacks on Simulated and Silicon Data
- Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas
-
2013/111 ( PDF )
- Message Authentication Codes Secure against Additively Related-Key Attacks
- Keita Xagawa
-
2013/110 ( PDF )
- Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
- Gilad Asharov and Yehuda Lindell and Tal Rabin
-
2013/109 ( PDF )
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- Charanjit S. Jutla and Arnab Roy
-
2013/108 ( PDF )
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Ivan Damgard and Alessandra Scafuro
-
2013/107 ( PDF )
- On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
- Murat Cenk and M. Anwar Hasan
-
2013/106 ( -- withdrawn -- )
- URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
- Roohallah Rastaghi
-
2013/105 ( PDF )
- Lossy Chains and Fractional Secret Sharing
- Yuval Ishai and Eyal Kushilevitz and Omer Strulovich
-
2013/104 ( PDF )
- A Tutorial on White-box AES
- James A. Muir
-
2013/103 ( PDF )
- On the Complexity of Broadcast Setup
- Martin Hirt and Pavel Raykov
-
2013/102 ( PDF )
- On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
- Yuchen Cao, Yongbin Zhou and Zhenmei Yu
-
2013/101 ( PDF )
- Notions of Black-Box Reductions, Revisited
- Paul Baecher and Christina Brzuska and Marc Fischlin
-
2013/100 ( PDF )
- Attacks and Comments on Several Recently Proposed Key Management Schemes
- Niu Liu and Shaohua Tang and Lingling Xu
-
2013/099 ( PDF )
- Constant-round secure two-party computation from a linear number of oblivious transfer
- Samuel Ranellucci and Alain Tapp
-
2013/098 ( PDF )
- Learning with Rounding, Revisited: New Reduction, Properties and Applications
- Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs
-
2013/097 ( PDF )
- Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
- Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2013/096 ( PDF )
- State convergence in bit-based stream ciphers
- Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson
-
2013/095 ( PDF )
- A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
- Antoine Joux
-
2013/094 ( PDF )
- On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
- Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
-
2013/093 ( PDF )
- On the security of a certificateless aggregate signature scheme
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou
-
2013/092 ( PDF )
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- Vadim Lyubashevsky and Daniel Masny
-
2013/091 ( PDF )
- Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
- Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
-
2013/090 ( -- withdrawn -- )
- Functional Encryption Supporting Recursive Languages
- Somindu C. Ramanna and Palash Sarkar
-
2013/089 ( PDF )
- Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
- James McLaughlin and John A. Clark
-
2013/088 ( PDF )
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Dan Boneh and Mark Zhandry
-
2013/087 ( PDF )
- Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
- Namhun Koo and Gook Hwa Cho and Soonhak Kwon
-
2013/086 ( PDF )
- Efficient Private File Retrieval by Combining ORAM and PIR
- Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2013/085 ( PDF )
- Between a Rock and a Hard Place: Interpolating Between MPC and FHE
- Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
-
2013/084 ( PDF )
- Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
- Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse
-
2013/083 ( PDF )
- A Security Framework for Analysis and Design of Software Attestation
- Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann
-
2013/082 ( PDF )
- Secret Sharing, Rank Inequalities and Information Inequalities
- Sebastia Martin and Carles Padro and An Yang
-
2013/081 ( PDF )
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
- Yan Huang and Jonathan Katz and Dave Evans
-
2013/080 ( PDF )
- An efficient attack of a McEliece cryptosystem variant based on convolutional codes
- Grégory Landais and Jean-Pierre Tillich
-
2013/079 ( PDF )
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Yehuda Lindell
-
2013/078 ( PDF )
- Broadcast Steganography
- Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera
-
2013/077 ( PDF )
- UC-Secure Multi-Session OT Using Tamper-Proof Hardware
- Kaoru Kurosawa and Ro Nojima and Le Trieu Phong
-
2013/076 ( PDF )
- Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
- Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas
-
2013/075 ( PDF )
- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
- Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig
-
2013/074 ( PDF )
- On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$
- Faruk Göloğlu and Robert Granger and Gary McGuire and Jens Zumbrägel
-
2013/073 ( PDF )
- Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
- Marek Jawurek and Florian Kerschbaum and Claudio Orlandi
-
2013/072 ( PDF )
- The UC approach: an application view
- István Vajda
-
2013/071 ( PDF )
- Relation collection for the Function Field Sieve
- Jérémie Detrey and Pierrick Gaudry and Marion Videau
-
2013/070 ( PDF )
- Related-key Attacks Against Full Hummingbird-2
- Markku-Juhani O. Saarinen
-
2013/069 ( PDF )
- Hardness of SIS and LWE with Small Parameters
- Daniele Micciancio and Chris Peikert
-
2013/068 ( PDF )
- Why Proving HIBE Systems Secure is Difficult
- Allison Lewko and Brent Waters
-
2013/067 ( PDF )
- Power Analysis of Hardware Implementations Protected with Secret Sharing
- Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche
-
2013/066 ( PDF )
- Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
- Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref
-
2013/065 ( PDF )
- Instantiating Treeless Signature Schemes
- Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann
-
2013/064 ( PDF )
- Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
- Sven Laur and Bingsheng Zhang
-
2013/063 ( PDF )
- A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
- Christian L. F. Corniaux and Hossein Ghodosi
-
2013/062 ( PDF )
- Symbolic Universal Composability
- Florian Böhl and Dominique Unruh
-
2013/061 ( PS PS.GZ PDF )
- On the Indifferentiability of Key-Alternating Ciphers
- Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger
-
2013/060 ( PDF )
- On FHE without bootstrapping
- Aayush Jain
-
2013/059 ( PDF )
- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
- Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay
-
2013/058 ( PDF )
- Cryptanalysis of the Dragonfly Key Exchange Protocol
- Dylan Clarke and Feng Hao
-
2013/057 ( PDF )
- CRT-based Fully Homomorphic Encryption over the Integers
- Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon
-
2013/056 ( PDF )
- On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
- Kishan Chand Gupta and Indranil Ghosh Ray
-
2013/055 ( PDF )
- Secrecy without one-way functions
- Dima Grigoriev and Vladimir Shpilrain
-
2013/054 ( PDF )
- Joint Compartmented Threshold Access Structures
- Ali Aydın Selçuk and Ramazan Yılmaz
-
2013/053 ( PDF )
- A revocable certificateless signature scheme
- Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng
-
2013/052 ( PDF )
- Some Complexity Results and Bit Unpredictable for Short Vector Problem
- Kuan Cheng
-
2013/051 ( PDF )
- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
- Payman Mohassel and Ben Riva
-
2013/050 ( PS PS.GZ PDF )
- Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
- Roohallah Rastaghi
-
2013/049 ( PDF )
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
- Christopher Meyer and Jörg Schwenk
-
2013/048 ( PDF )
- Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
- Basel Halak, Julian Murphy, Alex Yakovlev
-
2013/047 ( PDF )
- Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
- Carles Padro
-
2013/046 ( PDF )
- Fast and Maliciously Secure Two-Party Computation Using the GPU
- Tore Kasper Frederiksen and Jesper Buus Nielsen
-
2013/045 ( -- withdrawn -- )
- Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
- Jiawei Yuan and Shucheng Yu
-
2013/044 ( PDF )
- Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
- Fangguo Zhang and Xu Ma and Shengli Liu
-
2013/043 ( PDF )
- Differential Fault Attack on the PRINCE Block Cipher
- Ling Song and Lei Hu
-
2013/042 ( PDF )
- Complexity of Multi-Party Computation Functionalities
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2013/041 ( PDF )
- Trace Expression of r-th Root over Finite Field
- Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
-
2013/040 ( PDF )
- An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
- Roohallah Rastaghi
-
2013/039 ( PDF )
- Creating a Challenge for Ideal Lattices
- Thomas Plantard and Michael Schneider
-
2013/038 ( PDF )
- Verifiable Data Streaming
- Dominique Schröder and Heike Schröder
-
2013/037 ( PDF )
- Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
- Jayaprakash Kar
-
2013/036 ( PDF )
- Batch Fully Homomorphic Encryption over the Integers
- Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
-
2013/035 ( -- withdrawn -- )
- Improvements to NFC Mobile Transaction and Authentication Protocol
- Muhammad Qasim Saeed
-
2013/034 ( PDF )
- New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
- Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2013/033 ( PDF )
- CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
- Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
-
2013/032 ( PDF )
- Detection of Cheaters in Non-interactive Polynomial Evaluation
- Maki Yoshida and Satoshi Obana
-
2013/031 ( PDF )
- An Analysis of the EMV Channel Establishment Protocol
- Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson
-
2013/030 ( PDF )
- On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
- Haiyan Sun
-
2013/029 ( PDF )
- Improved Differential Fault Attack on MICKEY 2.0
- Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
-
2013/028 ( PDF )
- More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
- Stanislav Bulygin
-
2013/027 ( PDF )
- Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
- Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson
-
2013/026 ( PDF )
- RSA private key reconstruction from random bits using SAT solvers
- Constantinos Patsakis
-
2013/025 ( PDF )
- The IITM Model: a Simple and Expressive Model for Universal Composability
- Ralf Kuesters and Max Tuengerthal
-
2013/024 ( PDF )
- New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
- Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
-
2013/023 ( PDF )
- A New Practical Identity-Based Encryption System
- Jong Hwan Park and Dong Hoon Lee
-
2013/022 ( PDF )
- Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
- James McLaughlin and John A. Clark
-
2013/021 ( PDF )
- Rate-Limited Secure Function Evaluation: Definitions and Constructions
- Özgür Dagdelen and Payman Mohassel and Daniele Venturi
-
2013/020 ( PDF )
- Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
- Markus Rückert and Dominique Schroeder
-
2013/019 ( PDF )
- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
- Peter Gaži
-
2013/018 ( PDF )
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Jae Hong Seo and Keita Emura
-
2013/017 ( PDF )
- Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
- Alexandra Boldyreva and Robert Lychev
-
2013/016 ( PDF )
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Jae Hong Seo and Keita Emura
-
2013/015 ( PDF )
- Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
- Graham Enos
-
2013/014 ( PDF )
- On formal and automatic security verification of WSN transport protocols
- Ta Vinh Thong and Amit Dvir
-
2013/013 ( PDF )
- Efficiently Outsourcing Multiparty Computation under Multiple Keys
- Andreas Peter and Erik Tews and Stefan Katzenbeisser
-
2013/012 ( PDF )
- Tropical cryptography
- Dima Grigoriev and Vladimir Shpilrain
-
2013/011 ( PDF )
- Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
- James McLaughlin and John A. Clark
-
2013/010 ( PDF )
- Simultaneous Resettable WI from One-way Functions
- Kai-Min Chung and Rafael Pass
-
2013/009 ( PDF )
- Achieving Anonymity Against Major Face Recognition Algorithms
- Benedikt Driessen and Markus Dürmuth
-
2013/008 ( PDF )
- Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
- Kai-Min Chung and Rafael Pass and Karn Seth
-
2013/007 ( PDF )
- A Matrix Approach for Constructing Quadratic APN Functions
- Yuyin Yu and Mingsheng Wang and Yongqiang Li
-
2013/006 ( PDF )
- Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
- Qingfeng Cheng
-
2013/005 ( PDF )
- Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
- Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue and Faouzi Chekir
-
2013/004 ( PDF )
- Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
- Damien Stehlé and Ron Steinfeld
-
2013/003 ( PDF )
- On Formal Expressions of BRW-polynomials
- Guillermo Morales-Luna
-
2013/002 ( PDF )
- Generalized (Identity-Based) Hash Proof System and Its Applications
- Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
-
2013/001 ( PDF )
- Shielding circuits with groups
- Eric Miles and Emanuele Viola
[ Cryptology ePrint archive ]